Overview
A race condition vulnerability exists in the OpenSSH daemon. Successful exploitation of this vulnerability may result in a denial-of-service condition.
Description
OpenSSH is an open source client and server implementation of the Secure Shell (SSH) protocol. The OpenSSH server includes the ability to authenticate via the Generic Security Services Application Programming Interface (GSSAPI). Versions of OpenSSH prior to 4.4 contain a race condition in a signal handler during a logging operation prior to user authentication. |
Impact
A remote, unauthenticated attacker may be able to cause the OpenSSH server to crash, thereby creating a denial-of-service condition |
Solution
Upgrade See the systems affected section of this document for information about specific vendors. Users who compile OpenSSH from source are encouraged to update to the most recent version. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://rhn.redhat.com/errata/RHSA-2006-0697.html
- http://secunia.com/advisories/22173/
- http://openssh.org/txt/release-4.4
- http://secunia.com/advisories/22208/
- http://secunia.com/advisories/22236/
- http://secunia.com/advisories/22183/
- http://www.ubuntu.com/usn/usn-355-1
- http://tools.ietf.org/html/rfc2743
- http://support.avaya.com/elmodocs2/security/ASA-2006-216.htm
- http://secunia.com/advisories/22362/
- http://www.securityfocus.com/bid/20241
- http://docs.info.apple.com/article.html?artnum=305214
Acknowledgements
OpenSSH credits Mark Dowd for reporting this vulnerability.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2006-5051 |
Severity Metric: | 1.66 |
Date Public: | 2006-09-29 |
Date First Published: | 2006-10-04 |
Date Last Updated: | 2007-03-13 21:29 UTC |
Document Revision: | 37 |